| 查看: 774 | 回复: 4 | |||
| 当前主题已经存档。 | |||
[交流]
IT英语教材
|
|||
|
Chapter 1 COMPUTER VIRUS (Ⅰ) Contents: Section A: Introduction What’s the technical definition of a virus? A common misconception How does a computer virus infect files? Section B: Virus classification ◆ Macro virus ◆ Trojan horse ◆ Worms Section A____________________________________________________________________ INTRODUCTION Part One: reading comprehension Ⅰ.What’s the technical definition of a virus? A computer virus is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files. It can corrupt files, destroy data, display an irritating message, or otherwise disrupt computer operations. Note: technical 技术的,技术上的 2. definition 定义 virus 病毒 4. reproduce 复制, 再生 corrupt 腐烂, 使恶化 6. destroy 破坏 irritating 刺激的, 气人的 8. disrupt 破坏 Ⅱ. A common misconception A common misconception is that viruses contain program code to spread themselves from one computer to another. They do not. The reason viruses spread is because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading software from the Web. Note: 1. misconception 误解 2. infect 传染, 感染 3. exchange 交换 4. attachment 附件 5. download 下载 6. spread 传播, 蔓延 Ⅲ.How does a computer virus infect files? A computer virus generally infects the files executed by your computer----files with .exe, .com, or .vbs filename extensions. When your computer executes an infected program, it also executes the attached virus instructions. These instructions then remain in RAM, waiting to infect the next program that your computer runs, or the next disk that it accesses. In addition to replicating itself, a virus might perform a trigger event, sometimes referred to as a “payload”, which could be as harmless as displaying an annoying message, or as devastating as corrupting the data on your computer’s hard disk. Trigger events are often keyed to a specific date. For example, the Michelangelo virus is designed to damage hard disk files on March 6, the birthday of artist Michelangelo. Note: 1. generally 一般地 2. execute 执行 3. attached 附上的 4. remain 保持, 逗留, 残存 5. replicate 复制 6. trigger 引发, 触发 7. harmless 无害的 8. annoying 恼人的, 讨厌的 9. devastating 破坏性的 10. key 锁上 11. damage 损害, 伤害 12. artist 艺术家 Part Two: Assignment Filling the blanks and translate into Chinese. 1. The reason viruses spread is because people distribute ____________ by exchanging ________and _________, sending e-mail _____________, and downloading ___________ from the Web. Answers: 2. When your computer executes an ____________________, it also executes the ___________ virus instructions. These instructions then remain in ___________, waiting to infect the ___________ program that your computer runs, or the next disk that it ___________. Answers: Section B____________________________________________________________________ VIRUS CLASSIFICATION Part One: reading comprehension Viruses can be classified by the types of files they infect. Ⅰ. Macro virus A macro virus infects a set of instructions called a “macro”. A macro is essentially a miniature program that usually contains legitimate instructions to automate document and worksheet production. The two most common macro viruses are the Melissa virus, which attaches itself to Microsoft Word documents, and Codemas, which attaches itself to Microsoft Excel spreadsheets. Note: 1. macro 宏 2. essentially 本质上 3. miniature 缩小的, 微小的 4. legitimate 合法的, 合理的 5. automate 使自动化 6. worksheet 工作表 Ⅱ. Trojan horse How is a Trojan horse different from a virus? A Trojan horse is a computer program that seems to perform one function while actually doing something else. Technically, it is not the same as a virus because unlike a virus, a Trojan horse is not designed to make copies of itself. Trojan horses are notorious for stealing passwords. Note: 1. Trojan horse 特洛伊木马程序 2. notorious 声名狼藉的 3. seem 象是, 似乎 4. unlike 不象, 和什么不同 Ⅲ. Worms What’s a worm? With the proliferation of network traffic and e-mail, worms have become a major concern in the computing community. Unlike a virus, which is designed to spread from file to file, a worm is designed to spread from computer to computer. Most worms take advantage of communications networks----especially the Internet ----to travel within e-mail and TCP/IP packets, jumping from one computer to another. Some worms are happy simply to spread throughout a network. Others also deliver payload that vary from harmless message to malicious file deletions. Note: 1. worm 蠕虫 2. proliferation 扩散 3. major 主要的 4. concern 关注 5. community 社团, 社区 6. packet 包 7. throughout 贯穿, 遍及 8. deliver 递送, 运输 9. payload 有效荷载 10. malicious恶意的 11. deletion 删除 12. vary 改变, 变化 Part Two: Assignment Make clear with the question: How is a Trojan horse different from a virus? Filling the blanks and translate into Chinese. Viruses can be classified by the ______ of files they _________. A macro is essentially a miniature ________. It usually contains ___________ instructions to ___________ document and worksheet production. Trojan horse is not a virus because it is not designed to make _______ of itself. Trojan horses are notorious for _______________. A virus is designed to spread from _____to _____, while a worm is designed to spread from _______ to _________. Chapter 2 COMPUTER VIRUS (Ⅱ) Contents: Section A: Virus Behavior --- Infection Phase When the virus executes it can infect other programs. Many viruses go resident in the memory of your PC. Note Section B: Virus Behavior --- Attack Phase ◆Many viruses do unpleasant things. ◆Viruses often delay revealing their presence. ◆The attack phase is optional. Section A____________________________________________________________________ Virus Behavior --- Infection Phase Part One: reading comprehension Viruses have many different forms, but they all potentially have two phases to their execution: the infection phase and attack phase. Now we firstly discuss the infection phase. Note: 1.behavior 行为 2.infection 感染 3.phase 阶段 4.execution 执行 5.attack 攻击 6.discuss 讨论 7.infection phase 感染阶段 8.attack phase 攻击阶段 Ⅰ. When the virus executes it can infect other programs. Some viruses infect other programs each time they are executed; other viruses infect only upon a certain cause. This cause could be anything, a day or time, an external event on your PC, a counter within the virus, etc. virus writers want their programs to spread as far as possible before anyone notices them. Note: 1.upon 在…之上 2.certain 确定的 3.cause 原因 4.external 外部的 5.event 事件 6.counter 计算器 7.notice 注意,发现 8.possible 可能的 Ⅱ. Many viruses go resident in the memory of your PC. The virus may silently resident in memory wanting for you to access a diskette, copy a file, or execute a program, before it infects anything. Because the cause condition they use for their infection is hard to guess, viruses are more difficult to analyze. Resident viruses frequently take over portions of the system software on the PC to hide their existence. This technique is called stealth. Polymorphic techniques also help viruses to infect yet avoid detection. Note: 1.silently 默默的 2.resident 驻留 3.access 存取 4.diskette 磁盘 5.cause condition 触发条件 6.analyze 分析 7.frequently 常常,频繁地 8.take over 代替,接管 9.portion 一部分 10.hide 隐藏 11.existence 存在 12.technique 技术 13.stealth 隐藏,秘密行动 14.polymorphic 多态的 15.avoid 避免 16.detection 探测,发现 Ⅲ. Note Note that worms often take the opposite approach and spread as fast as possible. While this makes their detection virtually certain, it also has the effect of slowing networks and denying access. Note: 1.note 注意 2.opposite 相对的,相反的 3.approach 方法,途径 4.effect 效果,作用 5.deny 拒绝,否认 6.access 访问 Part Two: Assignment Fill in the banks and translate into Chinese. Viruses come in a great many different forms, but they all potentially have two phases to their execution, the _____ phase and the ____ phase. Note that worms often take the ______ approach and _____ as fast as possible. 2. Multiple choices. (1) Some viruses use _____ and _____ techniques to hide their existence. A. stealth B. polymorphic C. quickly spread D. replace a part of system software (2)______ maybe a certain cause that some viruses infect upon. A. a day B. a time C. an external event on your PC D. a counter within the virus Section B____________________________________________________________________ Virus Behavior --- Attack Phase Part One: reading comprehension Ⅰ.Many viruses do unpleasant things. Many viruses do unpleasant things such as deleting files or changing random data on your disk, simulating typos or merely slowing your PC down; some viruses do less harmful things such as playing music or creating messages or animation on your screen. Just as the infection phase can be caused by some event, the attack phase also has its own cause. Does this mean a virus without an attack phase is benign? No. Most viruses have bugs in them and these bugs often cause unintended negative side effects. In addition, even if the virus is perfect, it still steals system resources. Note: 1.unpleasant 使人不愉快的 2.random 随机的 3.simulate 冒充,模仿 4.typos 打字稿 5.merely 仅仅 6.slow down 降低速度 7.harmful 有害的 8.animation 动画 9.be caused by 由…引起 10.mean 意味 11.benign 良性的 12.bug 缺陷 13.unintended 未知的,非故意的 14.negative 消极的 15.perfect 完美的 16.steal 偷,窃取 Ⅱ. Viruses often delay revealing their presence. Viruses often delay revealing their presence by launching their attack only after they have had enough opportunity to spread. This means the attack could be delayed for days, weeks, months, or even years after the initial infection. Note: 1.delay 推迟 2.reveal 显示,暴露 3.presence 存在 4.launch 发动,发起 5.opportunity 机会,时机 6.initial 最初的 Ⅲ. The attack phase is optional. Many viruses simply reproduce and have no cause for an attack phase. Does this mean that these are “good” viruses? No! Anything that writes itself to your disk without your permission is stealing storage and CPU cycles. This is made worse since viruses that “just infect,” with no attack phase, often damage the programs or disks they infect. This is not an intentional act of the virus, but simply a result of the fact that many viruses contain extremely poor quality code. Note: 1.permission 许可,允许 2.storage 内存 3.cycle 循环,周期 4.CPU cycles CPU资源 5.worse 更坏的 6.intentional 有意图的 7.act 行动 8.extremely 极端地,非常地 9.result 结果,后果 10.quality 质量,品质 Part Two: Assignment Fill in the blanks and translate into Chinese. Many viruses do unpleasant things such as _____ files or ______ random data on your disk. Most viruses have ______ in them and these _____ often cause unintended negative side effects. In addition, even if the virus is perfect, it still steals system _______. The attack phase is _______, many viruses simply reproduce and have no ______ for an attack phase. Multiple choices. If a virus simply reproduce and have no cause for an attack phase, but it will still _______ without your permission. A. stealing storage B. pilfer (偷,盗) CPU cycles C. delete files D. play music (2) Viruses can delay their attack for ________. A. days B. weeks C. months D. years (3) Many viruses do harmful things such as __________. A. deleting files B. changing random data on your disk C. simulating typos D. slowing your PC down Chapter 3 |
» 猜你喜欢
存款400万可以在学校里躺平吗
已经有26人回复
拟解决的关键科学问题还要不要写
已经有8人回复
最失望的一年
已经有7人回复
推荐一本书
已经有16人回复
国自然申请面上模板最新2026版出了吗?
已经有20人回复
26申博
已经有3人回复
请教限项目规定
已经有3人回复
基金委咋了?2026年的指南还没有出来?
已经有10人回复
基金申报
已经有6人回复
疑惑?
已经有5人回复
|
FIREWALLS (Ⅰ) Contents: Section A: Introduction of firewalls What is a firewall? What It Does? Section B: How firewalls work? ◆With a firewall in place… ◆Methods to control traffic ◆State inspection ◆Proxy service ◆Packet filtering Section A____________________________________________________________________ INTRODUCTION OF FIREWALLS Part One: reading comprehension Ⅰ. What is a firewall? If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall. Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that’s why it’s called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Note: 1.length 长度,时间长短 2.firewall 防火墙 3.term 术语 4.basically 基本上,主要地 5.barrier 屏障 6.destructive 破坏性的 7.force 力量 8.property 财产,所有物 Ⅱ. What It Does? A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. If you know how data moves on the Internet, you can easily see how a firewall helps protect computers inside a large company. Let’s say that you work at a company with 500 employees. The company will therefore have hundreds of computers that all have network cards connecting them together. In addition, the company will have one or more connections to the Internet through something like T1 or T3 lines. Without a firewall in place, all of those hundreds of computers are directly accessible to anyone on the Internet. A person who knows what he or she is doing can probe those computers, try to make FTP connections to them, try to make telnet connection to them and so on. If one employee makes a mistake and leaves a security hole, hackers can get to the machine and exploit the hole. Note: 1.filter 过滤,筛选 2.private 私人的,私有的 3.incoming 引入的 4.packet 信息包 5.flag 标记 6.protect 保护 7.inside 在…内部 8.employee 职工,雇员 9.T1,传输速率可达1.544Mb/s的通讯线路 10. T3,传输速率可达44.763Mb/s的通信线路 11.in place 在适当的位置,适当 12.accessible 易接近的,可到达的 13.probe 探查,查明 14.FTP(File Transfer Protocol) 文件传送(输)协议 15.telnet 远程登录 16.mistake 错误,过失 17.security 安全 18.hacker 电脑黑客 19.hole 洞,突破口 20.exploit 开发,利用 Part Two: Assignment Filling the blanks and translate into Chinese. 1. A firewall is a _________ to keep ____________ _____________ away from your property. In fact, that’s why it’s called a firewall. Its job is __________ to a physical firewall that keeps a _________ from ____________ from one area to the next. Translation:_________________________________________________ 2. A firewall is a ________ or _________ device which filters the ______________ coming through the ____________ connection into your private network or computer system. If an ____________ packet of information is __________by the filters, it is not allowed through. Translation:_________________________________________________ 3. If one employee makes a __________ and leaves a _________ hole, ___________ can get to the machine and exploit the _______. Translation:________________________________________________ Section B____________________________________________________________________ HOW FIREWALLS WORK Part One: reading comprehension Ⅰ. With a firewall in place, the landscape is much different. A company will place a firewall at every connection to the Internet (for example, at every T1 line coming into the company). The firewall can implement security rules. For example, one of the security rules inside the company might be: Out of the 500 computers inside this company, only 1 of them is permitted to receive public FTP traffic. Allow FTP connections only to that one computer and prevent them on all others. A company can set up rules like this for FTP servers, Web servers, Telnet servers and so on. In addition, the company can control how employees connect to Web sites, whether files are allowed to leave the company over the network and so on. A firewall gives a company tremendous control over how people use the network. Note: 1.landscape 前景 2.place 放置,设置 3.rule 规则 4.permit 许可,允许 5.traffic 交通,通信量 6.prevent 防止,阻止 7.set up 设立,建立 8.in addition 另外 9.site 地点,地址 10.whether 是否,不管,无论 11.tremendous 巨大的,极大的 12.leave 离开 Ⅱ. Methods to control traffic Firewalls use one or more of three methods to control traffic flowing in and out of the network: Packet filtering: Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service: Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. State inspection: A newer method doesn’t examine the contents of each packet, but instead compares certain key parts of the packet to a database of trusted information. Information travelling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded. Note: 1.method 方法 2.flow 流动 3.chunk 块 4.analyze 分析,分解 5.filter 过滤器 6.discard 丢弃,抛弃 7.proxy 代理人 8.retrieve 重新得到 9.vice versa 反之亦然 10.compare 比较,相比 11.database 数据库 12.trusted 可靠的 13.monitor 监视 14.defining 定义的 15.comparison 对比,比较 16.yield 产生 17.reasonable 合理的 18.match 匹配 Part Two: Assignment 1. Filling the blanks and translate into Chinese. (1) Packets are analyzed __________ a set of filters. Packets that make it through the ___________ are sent to the _________ system and all others are __________. Translation:_________________________________________________ (2) A newer method doesn’t examine the ________ of each packet, but instead ___________ certain key parts of the packet to a __________of trusted information. Translation:_________________________________________________ |
2楼2005-12-10 00:47:16
|
Chapter 4 FIREWALLS (Ⅱ) Contents: Section A: Making the Firewall Fit You can add or remove filters based on: ◆IP addresses ◆Protocols ◆Ports ◆Specific words and phrases Section B: What It Protect You From Remote login ◆Application backdoors ◆SMTP session hijacking ◆Operating system bugs ◆Denial of service ◆E-mail bombs ◆Macros ◆Viruses ◆Spam Section A____________________________________________________________________ MAKING THE FIREWALL FIT Part One: reading comprehension Firewalls are customizable. This means that you can add or remove filters based on several conditions. Some of these are: 1. IP addresses: Each machine on the Internet is assigned a unique address called an IP address. A typical IP address looks like this: 216.27.61.137. For example, if a certain IP address outside the company is reading too many files from a server, the firewall can block all traffic to or from that IP address. Note: 1.fit 适合,符合 2.customizable 用户定制的 3.assign 分配,指派 4.block 阻碍,堵塞 2. Protocols: The protocol is the pre-defined way that someone who wants to use a service talks with that service. The “someone” could be a person, but more often it is a computer program like a Web browser. Protocols are often text, and simply describe how the client and server will have their conversation. A company might set up only one or two machines to handle a specific protocol on all other machines. Note: 1.predifine 预先确定 2.talk with 与…交谈,想说服 3.describe 描述 4.client 顾客,客户,客户机程序 5.text 文本 6.handle 处理 3. Ports: Any server machine makes its services available to the Internet using numbered ports, one for each service that is available on the server. For example, if a server machine is running a Web (HTTP) server and an FTP server, the Web server would typically be available on port 80, and the FTP server would be available on port 21. A company might block port 21 accesses on all machines but one inside the company. Note: 1.numbered 有限的 2.port 端口 3.typically 代表性地 4.available 可用到的,可利用的 4. Specific words and phrases: This can be anything. The firewall will sniff each packet of information for an exact match of the text listed in the filter. For example, you could instruct the firewall to block any packet with the word “X rated” (no hyphen). But you can include as many words, phrases and variations of them as you need. Note: 1.word 字,词 2.phrase 短语 3.sniff 发觉,发现 4.exact 精确的,准确的 5.instruct 命令,指示 6.hyphen 连字号 Part Two: Assignment 1. Firewalls are ____________. This means that you can _______ or ________ filters based on several conditions, include __________, _________, _____________, ___________ and so on. Translation:_________________________________________________ 2. Any server machine makes its services __________ to the Internet using __________ ports, one for each ________ that is available on the server. Translation:_________________________________________________ 3. If a certain IP address _________ the company is reading too __________ files from a server, the firewall can _________ all traffic to or from that IP address. Translation:_________________________________________________ Section B____________________________________________________________________ WHAT IT PROTECT YOU FROM Part One: reading comprehension There are many creative ways that unscrupulous people use to access or abuse unprotected computers: 1. Remote login: When someone is able to connect to your computer and control it in some form. This can range from being able to view or access your files to actually running programs on your computer. 2. Application backdoors: Some programs have special features that allow for remote access. Others contain bugs that provide a backdoor, or hidden access, that provides some level of control of the program. 3. SMTP session hijacking: SMTP is the most common method of sending e-mail over the Internet. By gaining access to a list of e-mail addresses, a person can send unsolicited junk e-mail to thousands of users. This is done quite often by redirecting the e-mail through the SMPT server of an unsuspecting host, making the actual sender of the spam difficult to trace. 4. Operating system bugs: Like applications, some operating systems have backdoors. Others provide remote access with insufficient security controls or have bugs that an experienced hacker can take advantage of. 5. Denial of service: What happens is that the hacker sends a request to the server to connect to it. When the server responds with an acknowledgement and tries to establish a session, it cannot find the system that made the request. By inundating a server with these unanswerable session requests, a hacker caused the server to slow to a crawl or eventually crash. 6. E-mail bombs: Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages. The level of security you establish will determine how many of these threats can be stopped by your firewall. Part Two: After-class reading Other ways that unscrupulous people use to access or abuse unprotected computers: 1. Macros: To simplify complicated (复杂的) procedures, many applications allow you to create a script of commands that the application can run. This script is known as a macro. Hackers have taken advantage of this to create their own macros that, depending on (依靠) the application, can destroy your data or crash your computer. 2. Viruses: Probably the most well-known threat is computer viruses. A virus is a small program that can copy itself to other computers. This way it can spread quickly from one system to the next. Viruses range from harmless messages to erasing(抹去,檫掉) all of your data. 3. Spam: Typically harmless but always annoying. Quite often it contains links to Web sites. Be careful of clicking on these because you may accidentally accept a cookie that provides a backdoor to your computer. Assignment: Master the contents of this article and try to translate it into Chinese. Note: 1.creative 创造性的 2.unscrupulous 无道德的 3.abuse 滥用,虐待 4.unprotected 无保护的 5.remote login 远程登录 6.actually 实际上,事实上 7.backdoor 秘密手段 8.feature 特征 9.hidden 隐藏的 10.unsolicited 未被恳求的 11. redirect (信件)重寄 12. hijack 抢劫,劫持 13.spam 非索要信息 14.experienced 经验丰富的 15.insufficient 不够的 16.take advantage of 利用 17.acknowledgement 确认 18.denial 否认,拒绝 19.session 会话 20.establish 建立,设立 21.inundate 淹没 22.crawl 爬行,蠕动 23.eventually 最后 24.crash 碰撞,坠毁,垮台 25.determine 决定 26.threat 威胁 27.simplify 简单化,单一化 28.simplify 程序,手续 29script 手稿,原本 30. accidentally 偶然地,意外地 Chapter 5 WINDOWS 2000 OVERVIEW Contents: Section A: What about Windows 2000? About Windows 2000 Professional Release of Windows 2000 Section B: Key technologies of Windows 2000 ◆Active Directory ◆Security ◆Storage ◆Networking ◆Enterprise Management Section A____________________________________________________________________ WHAT ABOUT WINDOWS 2000 Part One: reading comprehension 1. About Windows 2000 Professional Microsoft offers workstation versions of the Windows operating system, such as Windows NT Workstation and Windows 2000 Professional. Like Windows 95 and 98, Windows 2000 Professional is designed for the desktop, although it will support small networks. The differentiating features of Windows 2000 Professional include increased security, greater reliability, and the ability to support some specialized software applications designed for high-performance workstations. You might, for example, find professional video editing software that is designed to run on a computer that uses Windows 2000 Professional as its operating system, but will not run on a computer that uses Windows 98. Interestingly, the Windows 2000 Professional user interface looks almost identical to the Windows 98 interface. They are, however, totally different programs, which accounts for the unfortunate fact that Windows 2000 Professional cannot run some software or support all of the peripheral devices designed for Windows 98. Microsoft plans to eventually consolidate its desktop and workstation operating systems into a single product that will satisfy the needs of people who use either high-end workstations or standard desktop PCs. Note: 1. professional 专业的,职业的 2. although 虽然,尽管 3. differentiate 区别,区分 4. security 安全 5. reliability 可靠性 6. performance 性能 7. specialized 专门的,专科的 8. interestingly 有趣地 9. interface 界面 10. identical 同样的 11. totally 完全地 12. account for 说明 13. unfortunate 不幸的 14. consolidate 巩固 15. satisfy 满足,使满意 16. eventually 最后,终于 2. Release of Windows 2000 With each new release of Windows, Microsoft gives you new and inventive technologies to build more useful, manageable, and scalable networks. Windows 2000 is the most innovative release to date. ● Windows 2000 Professional ● Windows 2000 Server ● Windows 2000 Advanced Server ● Windows 2000 Datacenter Server Each of these products includes key advancements that change how you plan, design, and deploy Microsoft networks. To employ such groundbreaking features as Active Directory, Dynamic DNS (DDNS), you will need to plan ahead. Note: 1. release 发布 2. inventive 善于创造的,发明的 3. manageable 易于管理的 4. scalable 可升级的 5. innovative 创新的,革新的 6. release to date 迄今为止 7. datacenter 资料处理中心 8. advancement 前进,进步 9. deploy 配置,架构 10. groundbreaking 创造性的 11. Active Directory 活动目录 12. Dynamic DNS 动态域名系统 Part Two: Assignment 1. Microsoft offers ________ versions of the Windows operating system. 2. Windows 2000 Professional is designed for the ________, although it will support small ________. 3. Microsoft plans to eventually _________ its desktop and workstation operating systems into a _______ product that will ________ the needs of people who use either_________ workstations or ________ desktop PCs. 4. Windows 2000 is ________. ( multiple choice) A. new release of Windows B. the same as Windows NT C. an inventive technology D. used for building a scalable network Section B____________________________________________________________________ KEY TECHNOLOGIES OF WINDOWS 2000 Part One: reading comprehension Now we offer an overview of the key Windows 2000 technologies and services. (1) Active Directory 活动目录 Microsoft networks that are built with Active Directory can help you when you meet these challenges. Unlike down level directory services, Active Directory is hierarchical. Active Directory stores each of your company’s resources logically, forming a tree structure that mirrors your enterprise. Every resource in even the largest networks is easy to find and manage. (2) Security 安全性 The cornerstone of Windows 2000 security is Active Directory. It supports the granular access control, inheritance, and delegation of administrative task. This gives you the flexibility to secure resources without compromising your network’s purpose. Fine-granted access control is not offered in Windows NT 3.x or 4.0. This often forces you to assign permissions that give either too little or too much control. (3) Storage 存储 The Encrypting File System (EFS) would not be possible without extensions to NTFS. New Technology File System (NTFS) 5.0 is the foundation for several enhancements in Windows 2000. Sharing and managing your company’s data is top priority. You must gain complete control of storage to be a successful administrator. (4) Networking 联网 The improvements to networking in Windows 2000 are groundbreaking. For example, you have the opportunity in Windows 2000 to remove all NetBIOS traffic from your network. The Dynamic Domain Name System (DDNS) can entirely eliminate your dependence on NetBIOS and WINS. Some of the topics covered in this section are new in Windows 2000, other represent improvement to existing technologies. (5) Enterprise Management 企业管理 Along with its advances in directory management, security, public key cryptography(公共密钥加密), storage, and networking, Windows 2000 includes improvement in enterprise management. Total Cost of Ownership (TCO) is a leading concern shared by many companies. After you deploy a particular technology, a TCO study will consider the cost of maintaining (or owing). In corporate networks, most TCO efforts are aimed at reducing the expense of managing desktops. Note: 1. challenge 挑战 2. hierarchical 分等级的 3. logically 逻辑上 4. structure 结构,构造 5. mirror 反映 6. enterprise 企业 7. cornerstone 基础 8. granular 粒状的 9. inheritance 继承性 10. delegation 授权 11. administrative 管理的 12. flexibility 弹性,机动性 13. secure 保护 14. compromise 危害,损害 15. assign 分配,指派 16. EFS 加密文件系统 17. foundation 基础 18. enhancement 增进,增加 19. opportunity 机会,时机 20. remove 消除 21. eliminate 消除 22. entirely 完全地,彻底地 23. cryptography 密码系统 24. corporate 公司的,共同的 25. aim 目标,目的 26. reduce 减少,缩小 Part Two: Assignment 1. The cornerstone of Windows 2000 security is __________. 2. The Encrypting File System (EFS) would not be possible without extensions to __________. 3. The ______ can entirely eliminate your dependence on NetBIOS and WINS. 4. Windows 2000 has the key technologies, they are __________. (multiple choice) A. active directory B. flat directory C. security D. enterprise management |
3楼2005-12-10 00:47:40
0.5
|
4楼2005-12-10 09:45:53
5楼2005-12-10 14:16:32













回复此楼